CN113609505A - Digital watermark tampering monitoring method based on MD5 encryption - Google Patents

Digital watermark tampering monitoring method based on MD5 encryption Download PDF

Info

Publication number
CN113609505A
CN113609505A CN202110941022.8A CN202110941022A CN113609505A CN 113609505 A CN113609505 A CN 113609505A CN 202110941022 A CN202110941022 A CN 202110941022A CN 113609505 A CN113609505 A CN 113609505A
Authority
CN
China
Prior art keywords
embeddable
encryption
watermark
new
monitoring method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110941022.8A
Other languages
Chinese (zh)
Other versions
CN113609505B (en
Inventor
车文彬
刘超
郭丽娜
李晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Shurui Data Technology Co ltd
Original Assignee
Nanjing Shurui Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Shurui Data Technology Co ltd filed Critical Nanjing Shurui Data Technology Co ltd
Priority to CN202110941022.8A priority Critical patent/CN113609505B/en
Publication of CN113609505A publication Critical patent/CN113609505A/en
Application granted granted Critical
Publication of CN113609505B publication Critical patent/CN113609505B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention mainly relates to the technical field of communication encryption, and particularly provides a digital watermark tampering monitoring method based on MD5 encryption, which comprises a watermark embedding method and a watermark monitoring method, wherein the digital watermark tampering monitoring method automatically adds information of a tampering person for tracing responsibility when a user illegally modifies through a digital watermark tampering monitoring technology, adds digital watermark information by changing the numerical value on the premise of not influencing the use of the user, simultaneously, the digital watermark information is not easy to be found for a single user before and after embedding, the concealment reaches 100%, and the tampering detection sensitivity reaches more than 95%.

Description

Digital watermark tampering monitoring method based on MD5 encryption
Technical Field
The invention mainly relates to the technical field of communication encryption, in particular to a digital watermark tampering monitoring method based on MD5 encryption.
Background
Ensuring the integrity, availability and confidentiality of data is a key to database security. If the data content is subject to significant tampering, the authority and effect of the data content is greatly reduced, and even economic losses are brought to the company, for example, when the loan amount of the user in the financial product of the company is modified, the behavior directly damages the benefits of the company.
In the prior art, texts are backed up and whether the texts are falsified or not is judged by comparing and the like, the method is simple to realize, but a falsifier cannot be positioned by a single text, only information such as logs can be filtered and checked, the labor cost is high, and if a plurality of people operate the same text, the true falsifier cannot be positioned.
Disclosure of Invention
The invention mainly provides a digital watermark tampering monitoring method based on MD5 encryption, which is used for solving the technical problems in the background technology.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the digital watermark tampering monitoring method based on MD5 encryption is characterized by comprising a watermark embedding method and a watermark monitoring method; the watermark embedding method comprises the following steps: grouping original data by utilizing a grouping mechanism to obtain grouped data; decomposing the grouped data by using an embedding rule to obtain an embeddable part and a non-embeddable part, dividing and combining the non-embeddable part and obtaining data to be encrypted; performing MD5 encryption on data to be encrypted, and performing integer processing to obtain watermark information to be embedded; acquiring the embeddable position and the embeddable length of the embeddable part; intercepting the information of the watermark to be embedded according to the embeddable length and replacing the embeddable part; the watermark monitoring method comprises the following steps: setting a timer, and executing the following steps when triggering the timer: grouping the tampering monitoring files by utilizing a grouping mechanism to obtain new grouped data; decomposing the new grouped data by using an embedding rule to obtain a new embeddable part and a new non-embeddable part, dividing and combining the new non-embeddable part and obtaining data to be compared; performing MD5 encryption on the data to be compared, and performing integer processing to obtain watermark information to be compared; acquiring a new embeddable position and a new embeddable length of the new embeddable part; intercepting the new embeddable part of each data in each group by using the new embeddable position and the new embeddable length to obtain grouping watermark information, and combining the grouping watermark information to obtain combined watermark information; and comparing whether the corresponding positions of the combined watermark information and the watermark information to be compared are consistent or not.
Preferably, the MD5 encryption includes initializing MD5 parameters; the four 32-bit integer variables defined by the initialized MD5 parameter are: a =0x 67452301; b =0 xefclab 89; c =0x98 badcfe; and D =0x 10325476.
Preferably, the MD5 encryption further includes a bitwise operation function defining four MD5 bases; the bitwise operation functions are respectively: f (X, Y, Z) = (X and Y) or (not (X) and Z); g (X, Y, Z) = (X and Z) or (Y and not (Z)); h (X, Y, Z) = X xor Y xor Z; and I (X, Y, Z) = Y xor (X or not (Z)).
Preferably, the MD5 encryption further includes defining four logical processing functions for four-wheel transformations respectively; defining Mj to represent the jth sub-packet of the message (from 0 to 15); defining < < < s means cyclic left shift by s bits; the logic processing functions are respectively as follows: FF (a, b, c, d, Mj, s, ti) represents a = b + (a + (F (b, c, d) + Mj + ti) < < <s); GG (a, b, c, d, Mj, s, ti) represents a = b + (a + (G (b, c, d) + Mj + ti) < < <s); HH (a, b, c, d, Mj, s, ti) represents a = b + (a + (H (b, c, d) + Mj + ti) < < < s); and II (a, b, c, d, Mj, s, ti) represents a = b + (a + (I (b, c, d) + Mj + ti) < < s).
Preferably, the grouping mechanism is one group per row.
Preferably, the embedding rule is such that the magnitude of the modification is not more than 10%.
Compared with the prior art, the invention has the beneficial effects that: the invention provides a digital watermark tampering monitoring method based on MD5 encryption, which is characterized in that through a digital watermark tampering monitoring technology, when a user illegally modifies, information of a tamperer is automatically added so as to facilitate tracing, the system is mainly used for structured texts such as excel, csv and the like, digital watermark information is added by changing the numerical value on the premise of not influencing the use of the user, meanwhile, the digital watermark information is not easy to be found for a single user before and after embedding, the concealment reaches 100%, and the tampering detection sensitivity reaches more than 95%.
The present invention will be explained in detail below with reference to the drawings and specific embodiments.
Drawings
Fig. 1 is a flowchart of a watermark embedding method of the present invention;
fig. 2 is a flowchart of a watermark monitoring method of the present invention;
FIG. 3 is a table of source documents for experimental proof of the present invention;
fig. 4 is a table showing the watermarking for experimental proof of the present invention.
Detailed Description
In order to make the aforementioned features and advantages of the present invention more comprehensible, the present invention is described in detail with reference to the following embodiments.
Referring to fig. 1 and 2, the present invention provides a digital watermark tampering monitoring method based on MD5 encryption, including a watermark embedding method and a watermark monitoring method, wherein the watermark embedding method includes: grouping original data by using a grouping mechanism to obtain grouped data, decomposing the grouped data by using an embedding rule to obtain an embeddable part and an embeddable part, dividing and combining the embeddable part to obtain data to be encrypted, wherein the original three groups of data are respectively 2.323, 4.54 and 6.7, the three groups of data of the embeddable part are respectively 2.3, 4.5 and 6.7 according to the embedding rule, the data to be encrypted is 234567, then performing MD5 encryption on the data to be encrypted, and performing integer processing to obtain watermark information to be embedded, the watermark information to be embedded is a certain length integer, simultaneously, acquiring the embeddable position and the embeddable length of the embeddable part, taking the three groups of data as an example, and the embeddable position of the data is respectively 2.323、4.54And 6.7, the embeddable lengths are respectively 2, 1 and 0, after the embeddable position and the embeddable length are obtained, the information of the watermark to be embedded is intercepted according to the embeddable length and the embeddable part is replaced, so that the embedding of the watermark is completed, it needs to be noted that the mentioned grouping mechanism and embedding rule mainly serve the whole process, and a person skilled in the art can select the information according to the actual situation, so that the final purpose can be realized.
It should also be noted that, for MD5 encryption, it is a kind of Hash algorithm, and is used to generate an information digest for a piece of information, where the digest has uniqueness to the information, and its algorithm steps sequentially include padding, appending data length, initializing MD5 parameter, defining four MD5 basic bitwise operation functions and logic processing functions respectively used for four-wheel transformation, and transforming the input data, where padding refers to padding for pre-encrypted data, and ensuring that the length (in bytes) after padding is 56 for 64 remainder, i.e. the data length LEN = K × 64+56, K is an integer, and the padding method is to pad one 1, and then pad 0 to meet the above requirements; the length of the additional data refers to that 8 bytes of a 64-bit integer are added behind the data after the padding bits according to the sequence that the lower bits are before the upper bits, and the total length of the data after padding is as follows: LEN = K + 64+56+8= (K +1) × 64 Bytes; the transformation of the input data refers to performing N-round loop processing, and outputting the final result, and for the other steps, namely initializing MD5 parameters, defining bit-wise operation functions of four MD5 bases, and implementing logic processing functions for four-wheel transformation respectively, those skilled in the art can select the method according to the actual situation, and the final purpose can be achieved.
In addition, the watermark monitoring method comprises the following steps: setting a timer, and executing the following steps when the timer is triggered: grouping the tampering monitoring files by utilizing a grouping mechanism to obtain new grouped data, decomposing the new grouped data by utilizing an embedding rule to obtain a new embeddable part and a new non-embeddable part, dividing and combining the new non-embeddable part to obtain data to be compared, carrying out MD5 encryption on the data to be compared and carrying out integer processing to obtain watermark information to be compared, wherein the watermark information to be compared is a certain length integer, meanwhile, obtaining a new embeddable position and a new embeddable length of the new embeddable part, intercepting the new embeddable part of each data in each group by utilizing the new embeddable position and the new embeddable length to obtain grouped watermark information, combining the grouped watermark information to obtain combined watermark information, finally comparing whether the corresponding positions of the combined watermark information and the watermark information to be compared are consistent, if consistent, indicating that the data is not tampered, otherwise indicating that the grouped data is tampered, it should be noted that the grouping mechanism, the embedding rule and the parameter setting in MD5 encryption mentioned in the watermark monitoring method are the same as the corresponding specific implementation mentioned in the watermark embedding method.
The invention provides a digital watermark tampering monitoring method based on MD5 encryption, which is used for coding important information aiming at the problem that the illegal tampering of important files cannot be positioned, embedding important content information into a structured text in a mode of modifying a small amount of text information embedded code, and effectively positioning the tampering position when the text is tampered, thereby achieving the tampering monitoring effect, being suitable for practical use and worthy of popularization.
In view of the specific implementation of MD5 encryption, on the basis of the above embodiments, the present invention further provides a preferred technical solution, where the MD5 encryption includes initializing MD5 parameters; the four 32-bit integer variables defined by the initialized MD5 parameter are: a =0x 67452301; b =0 xefclab 89; c =0x98badcfe and D =0x 10325476.
In view of the specific implementation of MD5 encryption, on the basis of the above embodiment, the present invention further provides a preferred technical solution, where MD5 encryption further includes defining four MD5 basic bitwise operation functions; the bitwise operation functions are respectively: f (X, Y, Z) = (X and Y) or (not (X) and Z), G (X, Y, Z) = (X and Z) or (Y and not (Z)), H (X, Y, Z) = X xor Y xor Z, and I (X, Y, Z) = Y xor (X or not (Z)).
In view of the specific implementation of MD5 encryption, on the basis of the above embodiment, the present invention further provides a preferred technical solution, where MD5 encryption further includes defining four logic processing functions respectively used for four-wheel transformation; defining Mj to represent the jth sub-packet of the message (from 0 to 15), defining < < < to represent the cyclic left shift by s bits, the logical processing functions are respectively: FF (a, b, c, d, Mj, s, ti) denotes a = b + (a + (F (b, c, d) + Mj + ti) < < s), GG (a, b, c, d, Mj, s, ti) denotes a = b + (G (b, c, d) + Mj + ti) < < s), HH (a, b, c, d, Mj, s, ti) denotes a = b + (a + (H (b, c, d) + Mj + ti) < < s) and II (a, b, c, d, Mj, s, ti) denotes a = b + (a + (I (b, c, d) + Mj + ti) < < s).
In view of the specific implementation of the grouping mechanism, on the basis of the above embodiments, the present invention further provides a preferred technical solution, and the grouping mechanism is a group for each row, which is simple and easy to implement.
In view of the specific implementation of the embedding rule, on the basis of the above embodiment, the present invention further provides a preferred technical solution, where the embedding rule has a modification range not greater than 10%, and a moderate value, and is suitable for practical use.
On the basis of the above embodiment, the present invention further provides an experimental data table to verify that the method provided by the present invention has high watermark hiding performance and is not easy to be found by a user, wherein fig. 3 is an original file table for the experimental certification of the present invention, and fig. 4 is a table after the watermark is added for the experimental certification of the present invention.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations, such as: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, distributed computing environments that include any of the above systems or devices, and the like.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer and generally include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Finally, it should be further noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions, and that the terms "comprise," "include," or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus and, in the absence of any further limitation, does not exclude a process, method, article, or apparatus that comprises such elements Additional identical elements are present in the article or device.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, and the use of the term knowledge in the specification of the present invention is for the purpose of describing particular embodiments herein without intending to limit the invention, and the term "and/or" as used herein includes any and all combinations of one or more of the associated listed items, and the particular embodiments herein are used to explain the principles and embodiments of the present invention, and the above description of the embodiments is merely intended to aid in the understanding of the methods of the present invention and their core concepts; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (6)

1. The digital watermark tampering monitoring method based on MD5 encryption is characterized by comprising a watermark embedding method and a watermark monitoring method;
the watermark embedding method comprises the following steps:
grouping original data by utilizing a grouping mechanism to obtain grouped data;
decomposing the grouped data by using an embedding rule to obtain an embeddable part and a non-embeddable part, dividing and combining the non-embeddable part and obtaining data to be encrypted;
performing MD5 encryption on data to be encrypted, and performing integer processing to obtain watermark information to be embedded;
acquiring the embeddable position and the embeddable length of the embeddable part; and
intercepting the information of the watermark to be embedded according to the embeddable length and replacing the embeddable part;
the watermark monitoring method comprises the following steps of setting a timer and executing the following steps when the timer is triggered:
grouping the tampering monitoring files by utilizing a grouping mechanism to obtain new grouped data;
decomposing the new grouped data by using an embedding rule to obtain a new embeddable part and a new non-embeddable part, dividing and combining the new non-embeddable part and obtaining data to be compared;
performing MD5 encryption on the data to be compared, and performing integer processing to obtain watermark information to be compared;
acquiring a new embeddable position and a new embeddable length of the new embeddable part;
intercepting the new embeddable part of each data in each group by using the new embeddable position and the new embeddable length to obtain grouping watermark information, and combining the grouping watermark information to obtain combined watermark information; and
and comparing whether the corresponding positions of the combined watermark information and the watermark information to be compared are consistent or not.
2. The MD5 encryption-based digital watermark tamper monitoring method according to claim 1, wherein the MD5 encryption includes initializing MD5 parameters;
the four 32-bit integer variables defined by the initialized MD5 parameter are:
A=0x67452301;
B=0xefcdab89;
c =0x98 badcfe; and
D=0x10325476。
3. the MD5 encryption-based digital watermark tamper monitoring method according to claim 1, wherein the MD5 encryption further includes a bitwise operation function defining four MD5 bases;
the bitwise operation functions are respectively:
F(X,Y,Z)=(X and Y) or (not (X) and Z);
G(X,Y,Z)=(X and Z) or (Y and not (Z));
h (X, Y, Z) = X xor Y xor Z; and
I(X,Y,Z)=Y xor (X or not(Z))。
4. the MD5 encryption-based digital watermark tamper monitoring method according to claim 1, wherein the MD5 encryption further includes defining four logical processing functions for four-wheel transformations respectively;
defining Mj to represent the jth sub-packet of the message (from 0 to 15);
defining < < < s means cyclic left shift by s bits;
the logic processing functions are respectively as follows:
FF (a, b, c, d, Mj, s, ti) represents a = b + (a + (F (b, c, d) + Mj + ti) < < <s);
GG (a, b, c, d, Mj, s, ti) represents a = b + (a + (G (b, c, d) + Mj + ti) < < <s);
HH (a, b, c, d, Mj, s, ti) represents a = b + (a + (H (b, c, d) + Mj + ti) < < < s); and
II (a, b, c, d, Mj, s, ti) denotes a = b + (a + (I (b, c, d) + Mj + ti) < < < s).
5. The MD5 encryption-based digital watermark tamper monitoring method according to claim 1, wherein the grouping mechanism is one group per row.
6. The MD5 encryption-based digital watermark tampering monitoring method according to claim 1, wherein the embedding rule is a modification magnitude of not more than 10%.
CN202110941022.8A 2021-08-17 2021-08-17 Digital watermark tampering monitoring method based on MD5 encryption Active CN113609505B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110941022.8A CN113609505B (en) 2021-08-17 2021-08-17 Digital watermark tampering monitoring method based on MD5 encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110941022.8A CN113609505B (en) 2021-08-17 2021-08-17 Digital watermark tampering monitoring method based on MD5 encryption

Publications (2)

Publication Number Publication Date
CN113609505A true CN113609505A (en) 2021-11-05
CN113609505B CN113609505B (en) 2024-04-12

Family

ID=78308778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110941022.8A Active CN113609505B (en) 2021-08-17 2021-08-17 Digital watermark tampering monitoring method based on MD5 encryption

Country Status (1)

Country Link
CN (1) CN113609505B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294958A (en) * 2017-05-27 2017-10-24 宁波大学 Message integrity authentication method based on full homomorphism MAC
CN112134690A (en) * 2020-09-28 2020-12-25 中国银行股份有限公司 Ciphertext generation method and device
CN113190866A (en) * 2021-05-26 2021-07-30 江苏方天电力技术有限公司 Power plant data safety credible transmission method for enhancing digital watermarking technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294958A (en) * 2017-05-27 2017-10-24 宁波大学 Message integrity authentication method based on full homomorphism MAC
CN112134690A (en) * 2020-09-28 2020-12-25 中国银行股份有限公司 Ciphertext generation method and device
CN113190866A (en) * 2021-05-26 2021-07-30 江苏方天电力技术有限公司 Power plant data safety credible transmission method for enhancing digital watermarking technology

Also Published As

Publication number Publication date
CN113609505B (en) 2024-04-12

Similar Documents

Publication Publication Date Title
US10755252B1 (en) Identifying copyrighted material using embedded copyright information
EP3673392B1 (en) Copyright protection based on hidden copyright information
CN109074462A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
CN110809763A (en) Identifying copyrighted material using time-stamped embedded copyright information
EP3662637B1 (en) Identifying copyrighted material using embedded copyright information
US20060095775A1 (en) Fragile watermarks
CN112119424A (en) Identifying copyrighted material using embedded copyright information
CN108881230B (en) Secure transmission method and device for government affair big data
CN111183423A (en) Identifying copyrighted material using copyright information embedded in an electronic file
CN111164640A (en) Identifying copyrighted material using copyright information embedded in a table
CN110809762A (en) Identifying copyrighted material using embedded copyright information
Peng et al. Secure and traceable copyright management system based on blockchain
US8677133B1 (en) Systems and methods for verifying an electronic documents provenance date
CN1870000A (en) Method for setting customer flag information
CN113065151A (en) Relational database information security enhancement method, system, terminal and storage medium
CN113609505A (en) Digital watermark tampering monitoring method based on MD5 encryption
CN117131546A (en) Space object data Hash checking method using space point cloud set disorder
Iqbal et al. Self-constructing fragile watermark algorithm for. relational database integrity proof
Murugan et al. A robust watermarking technique for copyright protection for relational databases
Albahadily et al. Issuing Digital Signatures for Integrity and Authentication of Digital Documents
CN116527236B (en) Information change verification method and system for encryption card
CN1622509A (en) A super password generation and authentication method
Kirdat et al. Data leakage detection and file monitoring in cloud computing
Agarwal An efficient dual text steganographic approach: hiding data in a list of words
Li et al. Software Protection Technology on Tamper-Proof Hybrid Coded Chaotic Watermarking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant